Digital intelligence must overcome challenges to solving crypto crimes
While the value of cryptocurrencies has varied wildly in the last year, this has not diminished crypto’s attractiveness to criminals. Many of them are moving their illegal activities underground...
Crypto criminals got away with $5B less in 2020 as scam revenue falls
Revenue from crypto-related crime dropped by more than half in 2020 according to Chainalysis’ annual report on the subject.Cybercriminals netted around $5 billion less than the $10 billion plus...
North Korean Hackers target UN Security Members
New UN Security Council report reveals repeated targeting of UN Security Council officials over the past year
By Catalin Cimpanu
Today's security threats have expanded in scope and seriousness. There can now...
MFA-Minded Attackers Continue to Figure Out Workarounds
While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue.
By: Robert Lemos
As online users become increasingly aware of and use multifactor authentication (MFA),...
Infrastructure as Code Security and AppSec: Streamlined DevSecOps From App to Infra
Infrastructure as code (IaC) has fundamentally changed the way we build and manage infrastructure. By transforming cloud resources and their configurations into code, IaC allows us to store, version...
You Must Comply! Why You Need Proactive Open-Source License Compliance
As vulnerabilities in open-source code continue to play a prominent role in headline-grabbing exploits, such as Heartbleed and Log4Shell, a hidden source of open-source risk flies under the radar...
Prevent Secret Leaks: Find and Secure Secrets Across Your Repositories and Pipelines
Developers use secrets to enable their applications to securely communicate with other services. Hardcoding credentials (like usernames and passwords) simplifies development and saves time. Unfortunately, version control systems (VCS)...
Prisma Cloud Provides New Extensive Use Cases for Azure Customers
Microsoft Azure customers can now secure their data and networks and gain broader governance across their cloud assets.
Prisma Cloud, a leader in Cloud Security Posture Management (CSPM), reduces...
Top 8 Phishing Attacks of 2021
Top 8 Phishing Attacks of 2021 (Q1) and Advice for SMBs and MSPs
To wrap up the 1st Quarter of 2021 the CEO at HacWare, Tiffany Ricks, wanted to recap...